SlideShare ist ein Scribd-Unternehmen logo
1 von 39
Downloaden Sie, um offline zu lesen
Network Flow Analysis

          Mark Meiss
  Presentation for NaN-Group
       October 4, 2004
Overview
Data description
– The Internet2 (Abilene) data network
– Netflow traffic data
Data collection
Data analysis
– Techniques
– Preliminary results
Future work
What is Abilene?
Internet2 (Abilene) is a nationwide high-
speed data network for research and
higher education.
– Network backbone runs at 10 Gbps
– Over 220 member institutions
– Peers with over 40 other research networks
Abilene uses the same protocols as
Internet1 but only carries academic traffic.
– This is like the old NSFnet or vBNS
Why is Abilene Interesting?
The Abilene network is a transit network.
– It includes both international and domestic traffic.
– It offers a good view of server networks.
– Commercial transmit networks do not share traffic
  data.
The Abilene network is uncongested.
– Statistics will not be biased by packet loss.
The Abilene network contains students.
– Students are unconcerned about niceties of law.
– There is a lot of peer-to-peer and “grey” traffic.
What is “Netflow”?
In the early 1990’s, Cisco introduced a
new network router architecture.
The “line cards” in their new routers
contained a hardware hash table for
current network connections.
Somebody got the bright idea of sending
entries from the table onto the network
before clearing them from the hash table.
What is a Network Flow?
A network flow consists of one or more packets sent
from a source (IP, port) to a destination (IP, port) using
a certain transport protocol during some time interval.
Example:
  Source:       156.56.103.1,         port 80
  Dest.:        149.159.250.21, port 6132
  Protocol: TCP
  Packets: 20
The above network flow would be typical for a Web
connection.
Wait a Minute!
Don’t TCP connections involve two-way
communication?
– Yes, so every TCP connection is actually two flows
  from the point of view of Netflow.
UDP and ICMP are stateless, so how can they be
aggregated into flows?
– We assume that packets with matching 5-tuples
  during some period of time are part of the same flow.
Isn’t it hard for a router to keep up with this?
– Yes, so most modern routers sample the flow data at
  a ratio of about 100:1.
How is Netflow transmitted?
Most modern routers support the “Netflow
v5” format for representing flows.
– This includes a variety of additional
  information about each flow.
The router uses UDP to send packets
containing between 1 and 30 flow records
to a management workstation.
– (In this case, the management workstation is
  sitting on my desk.)
Netflow-v5 Header Format

      version number            # of flows in packet
                 router uptime (ms)
      export time (sec. since 1970-01-01 00:00:00 UTC)
                  export time (ns)
                 sequence number
engine type   engine ID              [padding]
Netflow-v5 Flow Record Format
                        source IP address
                    destination IP address
                  IP address of next-hop router
       SNMP ifIndex (in)               SNMP ifIndex (out)
                    total number of packets
                        total number of octets
                 router uptime at start of flow (ms)
                 router uptime at end of flow (ms)
          source port                   destination port
    [padding]     TCP flags         protocol         ToS
          source AS                      destination AS
   source mask    dest. mask                [padding]
How Much Data is There?
The Abilene routers generate between
700,000,000 and 800,000,000 flows per
day.
– At 48 bytes per record, that amounts to
  around 35 GB of data.
– Flows come in at a rate of about 3.4 Mbps.
– Data compresses at a ratio of about 2.8:1.
Most existing tools can’t handle this
volume of data.
What’s the Motivation?
Okay, so I’m storing egregious amounts of
data and making my hard drive whimper…
what for?
Flow Data as a Behavioral Network
Think of a single flow as defining an edge from a
source node to a destination node.
The resulting network describes the Internet as
it’s actually being used.
 – Many possible biases are eliminated.
 – A lot of dynamic information is included.
Most structural analysis of the Internet has
(necessarily) focused on its physical structure.
Imagine a Google based on data about where
people actually go!
Behavioral Anomaly Detection
My main interest is in recognizing different
types of behavior based on flow data.
– Can I determine whether a port is running a
  peer-to-peer application?
– Can I see the spread of a new worm across
  the network?
– Can I determine what kind of behavior is the
  prelude to an attack?
– Can I find new peer-to-peer applications
  before the word is out?
Preliminary Results
I wish this section had more, but I’m really
just getting off the ground…
The size of data has been a major
challenge.
– The network formed by a day of flow data has
  about 29.7 million nodes and 128 million
  edges.
– Just finding a way of converting a set of
  captured flows to a sparse matrix
  representation has been difficult.
Degree Distribution
Determining Clients and Servers
 Every network connection involves two hosts:
 – The client is the system that initiates the connection.
 – The server is the system that accepts the connection.
 Because of sampling, we’re as likely to see the
 client-to-server side as the server-to-client side.
 – This makes the direction basically meaningless.
 We can guess which is which using the port
 information.
 – The more common port number indicates the server.
 – The less common port number indicates the client.
Strength Distribution
This is the distribution of the total number
of octets in and out of each node.
Special problem for client/server version of
the network
– If we direct all flows from server to client,
  what do we do when we only have a volume
  for the opposite direction?
– For now, I treat the network as being
  undirected for studying strength.
AS Numbers
An “autonomous system” is the basic
building block of the Internet.
– An AS is responsible for its own interior
  routing.
– An AS is usually a large organization.
    For example, IU has its own AS, as does AT&T.
Top 10 ASes on Internet2
By degree                        By strength
1.    Hotmail                    1. Abilene
2.    Microsoft                  2. University of Oregon
3.    Microsoft-Europe           3. Hotmail
4.    North Carolina (NCREN)     4. Microsoft
5.    Michigan (MERIT)           5. North Carolina (NCREN)
6.    University of Washington   6. UCSD
7.    MIT                        7. UCLA
8.    UC-Berkeley                8. Michigan (MERIT)
9.    UMass                      9. University of Washington
10.   China (CERNET)             10. UMass
TCP Ports
Top 10 TCP Ports on Internet2
 By degree                   By strength
1.    Web                    1. Web
2.    Gnutella               2. iperf
3.    MS Messenger           3. iperf
4.    SQL Server             4. Usenet
5.    Web (Encrypted)        5. RTP (Streaming)
6.    Gnutella               6. iperf
7.    Mail                   7. SSH
8.    Web Tunneling (8082)   8. BitTorrent
9.    BitTorrent             9. Port 388 ?!?
10.   Usenet                 10. FTP
Where Do I Go Next?
Start to look at the dynamics of the network.
Focus on individual ports.
Examine clustering coefficients.
Attempt to filter out spoofed traffic.
Consider the server-only and client-only
networks.
– This will involve treating flows as edges in a bipartite
  graph.
Cluster nodes, ASes, and ports.
Thank You!
Any thoughts, questions, comments,
complaints, or observations are all
welcome!

Weitere ähnliche Inhalte

Was ist angesagt?

Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
IJRAT
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
Ravindra Raju Kolahalam
 

Was ist angesagt? (20)

TCPIP
TCPIPTCPIP
TCPIP
 
SCOR: Constraint Programming-based Northbound Interface for SDN
SCOR: Constraint Programming-based Northbound Interface for SDNSCOR: Constraint Programming-based Northbound Interface for SDN
SCOR: Constraint Programming-based Northbound Interface for SDN
 
Part 6 : Internet applications
Part 6 : Internet applicationsPart 6 : Internet applications
Part 6 : Internet applications
 
Week10 transport
Week10 transportWeek10 transport
Week10 transport
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
Link Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hostsLink Capacity Estimation in SDN-based End-hosts
Link Capacity Estimation in SDN-based End-hosts
 
Chapter 3 final
Chapter 3 finalChapter 3 final
Chapter 3 final
 
Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3Evaluation of mininet WiFi integration via ns-3
Evaluation of mininet WiFi integration via ns-3
 
Tunneling vpn security and implementation
Tunneling vpn security and implementationTunneling vpn security and implementation
Tunneling vpn security and implementation
 
Unicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting NewUnicasting , Broadcasting And Multicasting New
Unicasting , Broadcasting And Multicasting New
 
IJET-V2I6P7
IJET-V2I6P7IJET-V2I6P7
IJET-V2I6P7
 
Paper id 25201418
Paper id 25201418Paper id 25201418
Paper id 25201418
 
(130316) #fitalk bit torrent protocol
(130316) #fitalk   bit torrent protocol(130316) #fitalk   bit torrent protocol
(130316) #fitalk bit torrent protocol
 
Internet without Internet Protocol
Internet without Internet ProtocolInternet without Internet Protocol
Internet without Internet Protocol
 
Plenzogan technology
Plenzogan technologyPlenzogan technology
Plenzogan technology
 
Ipspk1
Ipspk1Ipspk1
Ipspk1
 
Tipc Communication Groups
Tipc Communication GroupsTipc Communication Groups
Tipc Communication Groups
 
Bittorrent in a P2P social network
Bittorrent in a P2P social networkBittorrent in a P2P social network
Bittorrent in a P2P social network
 
Internet Protocol version 10 (IPv10).
Internet Protocol version 10 (IPv10).Internet Protocol version 10 (IPv10).
Internet Protocol version 10 (IPv10).
 
Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]Inter Process Communication Presentation[1]
Inter Process Communication Presentation[1]
 

Andere mochten auch

презентация Priut.kz, кофиделия
презентация Priut.kz, кофиделияпрезентация Priut.kz, кофиделия
презентация Priut.kz, кофиделия
webman86
 
Ley 67 de 2015 construccion Panamá
Ley 67 de 2015 construccion PanamáLey 67 de 2015 construccion Panamá
Ley 67 de 2015 construccion Panamá
via2021
 

Andere mochten auch (11)

La poblacio mundial
La poblacio mundialLa poblacio mundial
La poblacio mundial
 
Tema 15 la ciutat i el mòn urbà
Tema 15 la ciutat i el mòn urbàTema 15 la ciutat i el mòn urbà
Tema 15 la ciutat i el mòn urbà
 
Containers: The Next Big Social Network
Containers: The Next Big Social NetworkContainers: The Next Big Social Network
Containers: The Next Big Social Network
 
Tecnologia automatizada-indust.2016
Tecnologia automatizada-indust.2016Tecnologia automatizada-indust.2016
Tecnologia automatizada-indust.2016
 
feudalaisme
feudalaismefeudalaisme
feudalaisme
 
презентация Priut.kz, кофиделия
презентация Priut.kz, кофиделияпрезентация Priut.kz, кофиделия
презентация Priut.kz, кофиделия
 
2014 local government website survey
2014 local government website survey2014 local government website survey
2014 local government website survey
 
Damian sykes
Damian sykesDamian sykes
Damian sykes
 
Pagerank
PagerankPagerank
Pagerank
 
Corona de castella
Corona de castellaCorona de castella
Corona de castella
 
Ley 67 de 2015 construccion Panamá
Ley 67 de 2015 construccion PanamáLey 67 de 2015 construccion Panamá
Ley 67 de 2015 construccion Panamá
 

Ähnlich wie Network Flow Analysis

Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
Renee Jones
 
ip net basic understanding slide show ppt
ip net basic understanding slide show pptip net basic understanding slide show ppt
ip net basic understanding slide show ppt
lolo749806
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
jeronimored
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
Vamsi Krishna Kalavala
 
5c4318d6e4b09da1ac668621_original.pdf
5c4318d6e4b09da1ac668621_original.pdf5c4318d6e4b09da1ac668621_original.pdf
5c4318d6e4b09da1ac668621_original.pdf
AsgarAlam6
 

Ähnlich wie Network Flow Analysis (20)

Computer Networks Lecture Notes
Computer Networks Lecture NotesComputer Networks Lecture Notes
Computer Networks Lecture Notes
 
E-business Infrastructure and Security
E-business Infrastructure and SecurityE-business Infrastructure and Security
E-business Infrastructure and Security
 
Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )Networking Standards ( Osi Layers )
Networking Standards ( Osi Layers )
 
ip-basics.ppt
ip-basics.pptip-basics.ppt
ip-basics.ppt
 
ip net basic understanding slide show ppt
ip net basic understanding slide show pptip net basic understanding slide show ppt
ip net basic understanding slide show ppt
 
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking Android's mobile operating system is based on...
 
preKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.pptpreKnowledge-InternetNetworking.ppt
preKnowledge-InternetNetworking.ppt
 
Basic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notesBasic ccna interview questions and answers ~ sysnet notes
Basic ccna interview questions and answers ~ sysnet notes
 
Bcs 052 solved assignment
Bcs 052 solved assignmentBcs 052 solved assignment
Bcs 052 solved assignment
 
Wiki2010 Unit 4
Wiki2010 Unit 4Wiki2010 Unit 4
Wiki2010 Unit 4
 
Networking
NetworkingNetworking
Networking
 
IP NETWORKS
IP NETWORKSIP NETWORKS
IP NETWORKS
 
978 3-659-41237-0-e-book -adaramola michael
978 3-659-41237-0-e-book -adaramola michael978 3-659-41237-0-e-book -adaramola michael
978 3-659-41237-0-e-book -adaramola michael
 
5c4318d6e4b09da1ac668621_original.pdf
5c4318d6e4b09da1ac668621_original.pdf5c4318d6e4b09da1ac668621_original.pdf
5c4318d6e4b09da1ac668621_original.pdf
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTSNETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
NETTING THE SET: WORKSHOP FOR LIBRARIANS & LIS STUDENTS
 
ECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/SnaptutorialECET 465 help Making Decisions/Snaptutorial
ECET 465 help Making Decisions/Snaptutorial
 
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
Analysis of Random Based Mobility Model using TCP Traffic for AODV and DSDV M...
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocols
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Kürzlich hochgeladen (20)

PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 

Network Flow Analysis

  • 1. Network Flow Analysis Mark Meiss Presentation for NaN-Group October 4, 2004
  • 2. Overview Data description – The Internet2 (Abilene) data network – Netflow traffic data Data collection Data analysis – Techniques – Preliminary results Future work
  • 3. What is Abilene? Internet2 (Abilene) is a nationwide high- speed data network for research and higher education. – Network backbone runs at 10 Gbps – Over 220 member institutions – Peers with over 40 other research networks Abilene uses the same protocols as Internet1 but only carries academic traffic. – This is like the old NSFnet or vBNS
  • 4.
  • 5. Why is Abilene Interesting? The Abilene network is a transit network. – It includes both international and domestic traffic. – It offers a good view of server networks. – Commercial transmit networks do not share traffic data. The Abilene network is uncongested. – Statistics will not be biased by packet loss. The Abilene network contains students. – Students are unconcerned about niceties of law. – There is a lot of peer-to-peer and “grey” traffic.
  • 6. What is “Netflow”? In the early 1990’s, Cisco introduced a new network router architecture. The “line cards” in their new routers contained a hardware hash table for current network connections. Somebody got the bright idea of sending entries from the table onto the network before clearing them from the hash table.
  • 7. What is a Network Flow? A network flow consists of one or more packets sent from a source (IP, port) to a destination (IP, port) using a certain transport protocol during some time interval. Example: Source: 156.56.103.1, port 80 Dest.: 149.159.250.21, port 6132 Protocol: TCP Packets: 20 The above network flow would be typical for a Web connection.
  • 8. Wait a Minute! Don’t TCP connections involve two-way communication? – Yes, so every TCP connection is actually two flows from the point of view of Netflow. UDP and ICMP are stateless, so how can they be aggregated into flows? – We assume that packets with matching 5-tuples during some period of time are part of the same flow. Isn’t it hard for a router to keep up with this? – Yes, so most modern routers sample the flow data at a ratio of about 100:1.
  • 9. How is Netflow transmitted? Most modern routers support the “Netflow v5” format for representing flows. – This includes a variety of additional information about each flow. The router uses UDP to send packets containing between 1 and 30 flow records to a management workstation. – (In this case, the management workstation is sitting on my desk.)
  • 10. Netflow-v5 Header Format version number # of flows in packet router uptime (ms) export time (sec. since 1970-01-01 00:00:00 UTC) export time (ns) sequence number engine type engine ID [padding]
  • 11. Netflow-v5 Flow Record Format source IP address destination IP address IP address of next-hop router SNMP ifIndex (in) SNMP ifIndex (out) total number of packets total number of octets router uptime at start of flow (ms) router uptime at end of flow (ms) source port destination port [padding] TCP flags protocol ToS source AS destination AS source mask dest. mask [padding]
  • 12. How Much Data is There? The Abilene routers generate between 700,000,000 and 800,000,000 flows per day. – At 48 bytes per record, that amounts to around 35 GB of data. – Flows come in at a rate of about 3.4 Mbps. – Data compresses at a ratio of about 2.8:1. Most existing tools can’t handle this volume of data.
  • 13. What’s the Motivation? Okay, so I’m storing egregious amounts of data and making my hard drive whimper… what for?
  • 14. Flow Data as a Behavioral Network Think of a single flow as defining an edge from a source node to a destination node. The resulting network describes the Internet as it’s actually being used. – Many possible biases are eliminated. – A lot of dynamic information is included. Most structural analysis of the Internet has (necessarily) focused on its physical structure. Imagine a Google based on data about where people actually go!
  • 15. Behavioral Anomaly Detection My main interest is in recognizing different types of behavior based on flow data. – Can I determine whether a port is running a peer-to-peer application? – Can I see the spread of a new worm across the network? – Can I determine what kind of behavior is the prelude to an attack? – Can I find new peer-to-peer applications before the word is out?
  • 16. Preliminary Results I wish this section had more, but I’m really just getting off the ground… The size of data has been a major challenge. – The network formed by a day of flow data has about 29.7 million nodes and 128 million edges. – Just finding a way of converting a set of captured flows to a sparse matrix representation has been difficult.
  • 18.
  • 19.
  • 20. Determining Clients and Servers Every network connection involves two hosts: – The client is the system that initiates the connection. – The server is the system that accepts the connection. Because of sampling, we’re as likely to see the client-to-server side as the server-to-client side. – This makes the direction basically meaningless. We can guess which is which using the port information. – The more common port number indicates the server. – The less common port number indicates the client.
  • 21.
  • 22.
  • 23. Strength Distribution This is the distribution of the total number of octets in and out of each node. Special problem for client/server version of the network – If we direct all flows from server to client, what do we do when we only have a volume for the opposite direction? – For now, I treat the network as being undirected for studying strength.
  • 24.
  • 25.
  • 26. AS Numbers An “autonomous system” is the basic building block of the Internet. – An AS is responsible for its own interior routing. – An AS is usually a large organization. For example, IU has its own AS, as does AT&T.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31. Top 10 ASes on Internet2 By degree By strength 1. Hotmail 1. Abilene 2. Microsoft 2. University of Oregon 3. Microsoft-Europe 3. Hotmail 4. North Carolina (NCREN) 4. Microsoft 5. Michigan (MERIT) 5. North Carolina (NCREN) 6. University of Washington 6. UCSD 7. MIT 7. UCLA 8. UC-Berkeley 8. Michigan (MERIT) 9. UMass 9. University of Washington 10. China (CERNET) 10. UMass
  • 33.
  • 34.
  • 35.
  • 36.
  • 37. Top 10 TCP Ports on Internet2 By degree By strength 1. Web 1. Web 2. Gnutella 2. iperf 3. MS Messenger 3. iperf 4. SQL Server 4. Usenet 5. Web (Encrypted) 5. RTP (Streaming) 6. Gnutella 6. iperf 7. Mail 7. SSH 8. Web Tunneling (8082) 8. BitTorrent 9. BitTorrent 9. Port 388 ?!? 10. Usenet 10. FTP
  • 38. Where Do I Go Next? Start to look at the dynamics of the network. Focus on individual ports. Examine clustering coefficients. Attempt to filter out spoofed traffic. Consider the server-only and client-only networks. – This will involve treating flows as edges in a bipartite graph. Cluster nodes, ASes, and ports.
  • 39. Thank You! Any thoughts, questions, comments, complaints, or observations are all welcome!